Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Fragnesia Linux Kernel Vulnerability Allows Root Access

Fragnesia Linux Kernel Vulnerability Allows Root Access

Posted on May 14, 2026 By CWS

Security experts have uncovered a new local privilege escalation (LPE) vulnerability within the Linux kernel, identified as Fragnesia, which permits attackers to gain root access. This discovery marks the third such vulnerability found in the kernel over the last two weeks. The flaw is classified under CVE-2026-46300, boasting a CVSS score of 7.8, and was identified by William Bowling from the V12 security team.

Details of the Fragnesia Vulnerability

Fragnesia exploits a flaw in the XFRM ESP-in-TCP subsystem of the Linux kernel, allowing unprivileged users to alter read-only file contents within the kernel page cache. As reported by Google-owned Wiz, attackers can leverage this flaw to escalate privileges to root through a deterministic page-cache corruption.

Security advisories have been issued by several Linux distributions, with V12 highlighting that this bug, although distinct from the Dirty Frag issue, shares the same attack surface. The vulnerability enables arbitrary byte writes into the kernel page cache of read-only files without a race condition, presenting a serious security risk.

Mitigation and Security Measures

Users who previously applied the Dirty Frag mitigation need not take further immediate action until official patches are released, according to CloudLinux maintainers. Meanwhile, Red Hat is assessing whether existing mitigations cover this new threat. Wiz has cautioned that AppArmor restrictions might offer limited protection, necessitating additional bypasses for successful exploitation.

Microsoft has urged users to apply available patches swiftly, even though there have been no reports of in-the-wild exploitation. They recommend disabling certain functionalities, limiting shell access, and enhancing monitoring to detect unusual privilege escalation attempts.

Emerging Threats and Exploit Market

Coinciding with the Fragnesia revelation, a cybercriminal known as “berz0k” has surfaced on forums, marketing a zero-day Linux LPE exploit for $170,000. The exploit reportedly affects multiple major Linux distributions and operates without causing system crashes, leveraging a TOCTOU-based method.

The cybersecurity community remains on high alert as the market for Linux vulnerabilities continues to evolve, urging organizations to fortify their systems against potential threats while awaiting comprehensive patch deployments.

In conclusion, the Fragnesia vulnerability underscores the need for continuous vigilance and timely application of security patches to safeguard against escalating threats in the Linux ecosystem.

The Hacker News Tags:CVE-2026-46300, Cybersecurity, Dirty Frag, Fragnesia, kernel vulnerability, Linux distributions, Linux security, local privilege escalation, page cache corruption, root access

Post navigation

Previous Post: NGINX Vulnerability Allows Remote Code Execution
Next Post: Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Related Posts

AI Browsers Vulnerable to Phishing Attacks: A Security Concern AI Browsers Vulnerable to Phishing Attacks: A Security Concern The Hacker News
OpenAI to Show Ads in ChatGPT for Logged-In U.S. Adults on Free and Go Plans OpenAI to Show Ads in ChatGPT for Logged-In U.S. Adults on Free and Go Plans The Hacker News
Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks The Hacker News
China-Linked Group Targets Singapore Telecom in Cyber Attack China-Linked Group Targets Singapore Telecom in Cyber Attack The Hacker News
Malicious Ruby and Go Modules Target CI Environments Malicious Ruby and Go Modules Target CI Environments The Hacker News
Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark